Audit of all publicly accessible systems by means of a security scan with in-depth testing of selected systems in a penetration test. In addition, several web applications were subjected to a thorough web application penetration test.